SlideShare uma empresa Scribd logo
1 de 27
Create Agile confidence for
better application security
Rogue Wave Accelerate Series
Part 2 of 3
Christine Bottagaro, CMO
Presenter
Rogue Wave Software
2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
Agenda
© 2015 Rogue Wave Software, Inc. All Rights Reserved.
• Agile Methodology
• Security as a service
• Integrated security goals
• Best practices for Agile teams
• How to get started
3
Agile benefits
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 4
Adaptive
Integrated development teams
Fewer surprises when working in
a cross-functional environment
Faster feedback loop
Faster time to market
Constant feedback during
development
Responds quickly to changing
requirements
Agile versus Waterfall
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 5
Fixed requirementsAdaptive
Integrated teams
Best for…
Separation of duties
• Rapid development cycles
• Frequent releases
• Cross-functional responsibilities
• Cooperative decision making
• Fast time to market
• Smaller projects
• Websites, graphical interfaces
Best for…
• Complicated systems
• System and backend applications
• Development, security and compliance work
independently
• Separate reporting
• Longer development cycles
• Few releases per year
• Patches
Agile Waterfall
Traditional development: Security as a service
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 6
Adaptive
Separation of duties for testing and auditing
Separate testing tools, results fed to development
Traditional Secure Development Lifecycle Activities
Design
• Establish design
Requirements
• Analyze attack
surface
• Threat modeling
Build
• Use approved tools
• Deprecate unsafe
functions
Test
• Static analysis
• Dynamic analysis
• Fuzz testing
• Attack surface
review
• Open source
review
Deploy
• Incident response
plan
• Final security
review
• Release archive
Development, compliance, and security are independent functions
Req's
• Establish security
requirements
• Create quality
gates
• Risk assessments
Consequences of security as a service
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 7
Adaptive
Cost of Remediation Source: Barry Boehm, “Equity Keynote Address” March 19, 2007
Cost of Remediation
Increased
remediation costs
Delayed releases
Security and
development
become adversarial
5x
Design
• Establish design
requirements
• Analyze attack
surface
• Threat modeling
10x
Build
• Use approved tools
• Deprecate unsafe
functions
20x
50x
Test
• Static analysis
• Dynamic analysis
• Fuzz testing
• Attack surface
review
• Open source
review
150x
Deploy
• Incident response
plan
• Final security
review
• Release archive
1x
Reqs
• Establish security
requirements
• Create quality
gates
• Risk assessments
Agile development: Integrated security
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 8
Adaptive
Accept
Sprint 1
Sprint 2
Sprint n
Release
Change
Adjust and Track
Feedback
Review
Next Iteration
No!
Yes
!
Release
to Market
Integrate
and Test
Integrate
and Test
Integrate
and Test
Multiple testing
points
Rapid feedback
required
“Outside” testing
does not meet
Agile needs
Integrated security goals
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 9
Adaptive
Build security into the Agile process
Adapt to the needs of each team
Provide information needed in a timely manner
Help teams improve over time
Maintain integrity of separation of duties
Best practices for Agile teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 10
Adaptive
Context for
remediation
Integrate security and compliance testing1
Enforce standards that relate to the project2
Context for remediation3
Continuous improvement4
Reporting for all stakeholders5
Best practices for Agile teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 11
Adaptive
Context for
remediation
Integrate security and compliance testing1
Enforce standards that relate to the project2
Context for remediation3
Continuous improvement4
Reporting for all stakeholders5
Best Practice 1.
Integrate security and compliance testing
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 12
AdaptiveGive Agile teams tools &
responsibility for testing
Self-sufficiency is
required for rapid
reaction
Run tests on
development
schedule
Embed security with
Agile team for triage
and assistance
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 13
Adaptive
Best Practice 1.
Integrate at IDE and Build Server
Do what
works best for
each team
Run separately
Integrate at IDEIntegrate at build server
Testing and remediation
on the fly
Testing at the end
of each sprint
Testing with each
sprint test build
Best practices for Agile teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 14
Adaptive
Context for
remediation
Integrate security and compliance testing1
Enforce standards that relate to the project2
Context for remediation3
Continuous improvement4
Reporting for all stakeholders5
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 15
Adaptive
Best Practice 2.
Enforce standards that relate to the project
Understand
the objectives
Risk varies
with application
deployments
Use flexible rule sets
Compliance
rules (e.g.,
PCI)
Language and
framework
specific rules
Custom rules
for custom
frameworks
High/low
security
requirements
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 16
Adaptive
Best Practice 2.
Compliance rule sets
PCI-DSS v 3
The vulnerabilities listed at
6.5.1 through 6.5.10 were
current with industry best
practices when this version
of PCI DSS was published.
However, as industry best
practices for vulnerability
management are updated
(for example, the OWASP
Guide, SANS CWE Top 25,
CERT Secure Coding, etc.),
the current best practices
must be used for these
requirements.
Specific rule sets
SANS Top 25
Reporting for regulatory audits
OWASP Top 10
Best practices for Agile teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 17
Adaptive
Context for
remediation
Integrate security and compliance testing1
Enforce standards that relate to the project2
Context for remediation3
Continuous improvement4
Reporting for all stakeholders5
Provide information needed to act
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 18
Best Practice 3.
Context for remediation
What needs
architectural review?
Provide actionable results
Prioritize results to
accelerate triage
Eliminate “noise” from
reporting
What can I fix quickly?
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 19
Adaptive
Best Practice 3.
Minimize code changes after code check-in
Trace errors to root causes
Input validation
Manifests
itself when
tainted data is
used
A single error
can result in
10’s or 100’s
of issues
Best practices for Agile teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 20
Adaptive
Context for
remediation
Integrate security and compliance testing1
Enforce standards that relate to the project2
Context for remediation3
Continuous improvement4
Reporting for all stakeholders5
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 21
Adaptive
Best Practice 4.
Continuous improvement
Help developers learn on
the job
Move from training “events”
to a training “process”
Source: https://uwaterloo.ca/counselling-services/curve-forgetting
Push remediation advice to the IDE
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 22
Adaptive
Best Practice 4.
Ongoing developer education
Remediation advice in the IDE
Specific to
bug type
Specific to
language rule
set
Best practices for Agile teams
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 23
Adaptive
Context for
remediation
Integrate security and compliance testing1
Enforce standards that relate to the project2
Context for remediation3
Continuous improvement4
Reporting for all stakeholders5
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 24
Adaptive
Best Practice 5.
Enterprise reporting
Development
Security reporting
Compliance reporting
Legal reporting
Identify security training needs
Maintain independence of audits
Testing for OWASP/SANS bugs
Audits and reporting for OSS
Traceability for security risks
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 25
Adaptive
How to get started
Empower development
with training, processes,
and technology to own
security testing
Build testing earlier into
the development process
Start with a pilot project
Develop coding and
remediation standards
Close the loop
1 2
3 4
5
72% of developers think they are responsible for security
See us in action:
www.roguewave.com
Klocwork
OpenLogic
Create Agile confidence for better application security

Mais conteúdo relacionado

Mais procurados

Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017Suman Sourav
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsSuman Sourav
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldRogue Wave Software
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software RemediationDenim Group
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks Ulf Mattsson
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
Devops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevSecCon
 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for securitySuman Sourav
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportPuppet
 
How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program Denim Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowDevOps.com
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSoftServe
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps JourneyVeracode
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 

Mais procurados (20)

Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Devops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter Chestna
 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for security
 
Key Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps ReportKey Findings from the 2019 State of DevOps Report
Key Findings from the 2019 State of DevOps Report
 
How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program How to Integrate AppSec Testing into your DevOps Program
How to Integrate AppSec Testing into your DevOps Program
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Security Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar TymoshykSecurity Services and Approach by Nazar Tymoshyk
Security Services and Approach by Nazar Tymoshyk
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
DevOps
DevOpsDevOps
DevOps
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 

Semelhante a Create Agile confidence for better application security

Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development Rogue Wave Software
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)Qualitest
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurityRogue Wave Software
 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsDenim Group
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
How to achieve security, reliability, and productivity in less time
How to achieve security, reliability, and productivity in less timeHow to achieve security, reliability, and productivity in less time
How to achieve security, reliability, and productivity in less timeRogue Wave Software
 
Integrating Hardware (Waterfall) and Software (Agile) Development
Integrating Hardware (Waterfall) and Software (Agile) DevelopmentIntegrating Hardware (Waterfall) and Software (Agile) Development
Integrating Hardware (Waterfall) and Software (Agile) DevelopmentIntland Software GmbH
 
Integrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsIntegrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsTechWell
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Achim D. Brucker
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset Denim Group
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
SecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security ProsSecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security ProsDenim Group
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application securityRogue Wave Software
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Kevin Fealey
 

Semelhante a Create Agile confidence for better application security (20)

Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source Tools
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
How to achieve security, reliability, and productivity in less time
How to achieve security, reliability, and productivity in less timeHow to achieve security, reliability, and productivity in less time
How to achieve security, reliability, and productivity in less time
 
Integrating Hardware (Waterfall) and Software (Agile) Development
Integrating Hardware (Waterfall) and Software (Agile) DevelopmentIntegrating Hardware (Waterfall) and Software (Agile) Development
Integrating Hardware (Waterfall) and Software (Agile) Development
 
Integrating Automated Testing into DevOps
Integrating Automated Testing into DevOpsIntegrating Automated Testing into DevOps
Integrating Automated Testing into DevOps
 
Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
SecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security ProsSecDevOps: Development Tools for Security Pros
SecDevOps: Development Tools for Security Pros
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
 

Mais de Rogue Wave Software

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveRogue Wave Software
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureRogue Wave Software
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...Rogue Wave Software
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-timeRogue Wave Software
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyRogue Wave Software
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsRogue Wave Software
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youRogue Wave Software
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?Rogue Wave Software
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Rogue Wave Software
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure successRogue Wave Software
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and complianceRogue Wave Software
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureRogue Wave Software
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)Rogue Wave Software
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Rogue Wave Software
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxRogue Wave Software
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsRogue Wave Software
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSRogue Wave Software
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migrationRogue Wave Software
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmRogue Wave Software
 

Mais de Rogue Wave Software (20)

The Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data PerspectiveThe Global Influence of Open Banking, API Security, and an Open Data Perspective
The Global Influence of Open Banking, API Security, and an Open Data Perspective
 
No liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failureNo liftoff, touchdown, or heartbeat shall miss because of a software failure
No liftoff, touchdown, or heartbeat shall miss because of a software failure
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Adding layers of security to an API in real-time
Adding layers of security to an API in real-timeAdding layers of security to an API in real-time
Adding layers of security to an API in real-time
 
Getting the most from your API management platform: A case study
Getting the most from your API management platform: A case studyGetting the most from your API management platform: A case study
Getting the most from your API management platform: A case study
 
Advanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applicationsAdvanced technologies and techniques for debugging HPC applications
Advanced technologies and techniques for debugging HPC applications
 
The forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for youThe forgotten route: Making Apache Camel work for you
The forgotten route: Making Apache Camel work for you
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices Three big mistakes with APIs and microservices
Three big mistakes with APIs and microservices
 
5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success5 strategies for enterprise cloud infrastructure success
5 strategies for enterprise cloud infrastructure success
 
PSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliancePSD2 & Open Banking: How to go from standards to implementation and compliance
PSD2 & Open Banking: How to go from standards to implementation and compliance
 
Java 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the futureJava 10 and beyond: Keeping up with the language and planning for the future
Java 10 and beyond: Keeping up with the language and planning for the future
 
How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)How to keep developers happy and lawyers calm (Presented at ESC Boston)
How to keep developers happy and lawyers calm (Presented at ESC Boston)
 
Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)Open source applied - Real world use cases (Presented at Open Source 101)
Open source applied - Real world use cases (Presented at Open Source 101)
 
How to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to LinuxHow to migrate SourcePro apps from Solaris to Linux
How to migrate SourcePro apps from Solaris to Linux
 
Approaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC appsApproaches to debugging mixed-language HPC apps
Approaches to debugging mixed-language HPC apps
 
Enterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOSEnterprise Linux: Justify your migration from Red Hat to CentOS
Enterprise Linux: Justify your migration from Red Hat to CentOS
 
Walk through an enterprise Linux migration
Walk through an enterprise Linux migrationWalk through an enterprise Linux migration
Walk through an enterprise Linux migration
 
How to keep developers happy and lawyers calm
How to keep developers happy and lawyers calmHow to keep developers happy and lawyers calm
How to keep developers happy and lawyers calm
 

Último

Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 

Último (20)

Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 

Create Agile confidence for better application security

  • 1. Create Agile confidence for better application security Rogue Wave Accelerate Series Part 2 of 3
  • 2. Christine Bottagaro, CMO Presenter Rogue Wave Software 2© 2015 Rogue Wave Software, Inc. All Rights Reserved.
  • 3. Agenda © 2015 Rogue Wave Software, Inc. All Rights Reserved. • Agile Methodology • Security as a service • Integrated security goals • Best practices for Agile teams • How to get started 3
  • 4. Agile benefits © 2015 Rogue Wave Software, Inc. All Rights Reserved. 4 Adaptive Integrated development teams Fewer surprises when working in a cross-functional environment Faster feedback loop Faster time to market Constant feedback during development Responds quickly to changing requirements
  • 5. Agile versus Waterfall © 2015 Rogue Wave Software, Inc. All Rights Reserved. 5 Fixed requirementsAdaptive Integrated teams Best for… Separation of duties • Rapid development cycles • Frequent releases • Cross-functional responsibilities • Cooperative decision making • Fast time to market • Smaller projects • Websites, graphical interfaces Best for… • Complicated systems • System and backend applications • Development, security and compliance work independently • Separate reporting • Longer development cycles • Few releases per year • Patches Agile Waterfall
  • 6. Traditional development: Security as a service © 2015 Rogue Wave Software, Inc. All Rights Reserved. 6 Adaptive Separation of duties for testing and auditing Separate testing tools, results fed to development Traditional Secure Development Lifecycle Activities Design • Establish design Requirements • Analyze attack surface • Threat modeling Build • Use approved tools • Deprecate unsafe functions Test • Static analysis • Dynamic analysis • Fuzz testing • Attack surface review • Open source review Deploy • Incident response plan • Final security review • Release archive Development, compliance, and security are independent functions Req's • Establish security requirements • Create quality gates • Risk assessments
  • 7. Consequences of security as a service © 2015 Rogue Wave Software, Inc. All Rights Reserved. 7 Adaptive Cost of Remediation Source: Barry Boehm, “Equity Keynote Address” March 19, 2007 Cost of Remediation Increased remediation costs Delayed releases Security and development become adversarial 5x Design • Establish design requirements • Analyze attack surface • Threat modeling 10x Build • Use approved tools • Deprecate unsafe functions 20x 50x Test • Static analysis • Dynamic analysis • Fuzz testing • Attack surface review • Open source review 150x Deploy • Incident response plan • Final security review • Release archive 1x Reqs • Establish security requirements • Create quality gates • Risk assessments
  • 8. Agile development: Integrated security © 2015 Rogue Wave Software, Inc. All Rights Reserved. 8 Adaptive Accept Sprint 1 Sprint 2 Sprint n Release Change Adjust and Track Feedback Review Next Iteration No! Yes ! Release to Market Integrate and Test Integrate and Test Integrate and Test Multiple testing points Rapid feedback required “Outside” testing does not meet Agile needs
  • 9. Integrated security goals © 2015 Rogue Wave Software, Inc. All Rights Reserved. 9 Adaptive Build security into the Agile process Adapt to the needs of each team Provide information needed in a timely manner Help teams improve over time Maintain integrity of separation of duties
  • 10. Best practices for Agile teams © 2015 Rogue Wave Software, Inc. All Rights Reserved. 10 Adaptive Context for remediation Integrate security and compliance testing1 Enforce standards that relate to the project2 Context for remediation3 Continuous improvement4 Reporting for all stakeholders5
  • 11. Best practices for Agile teams © 2015 Rogue Wave Software, Inc. All Rights Reserved. 11 Adaptive Context for remediation Integrate security and compliance testing1 Enforce standards that relate to the project2 Context for remediation3 Continuous improvement4 Reporting for all stakeholders5
  • 12. Best Practice 1. Integrate security and compliance testing © 2015 Rogue Wave Software, Inc. All Rights Reserved. 12 AdaptiveGive Agile teams tools & responsibility for testing Self-sufficiency is required for rapid reaction Run tests on development schedule Embed security with Agile team for triage and assistance
  • 13. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 13 Adaptive Best Practice 1. Integrate at IDE and Build Server Do what works best for each team Run separately Integrate at IDEIntegrate at build server Testing and remediation on the fly Testing at the end of each sprint Testing with each sprint test build
  • 14. Best practices for Agile teams © 2015 Rogue Wave Software, Inc. All Rights Reserved. 14 Adaptive Context for remediation Integrate security and compliance testing1 Enforce standards that relate to the project2 Context for remediation3 Continuous improvement4 Reporting for all stakeholders5
  • 15. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 15 Adaptive Best Practice 2. Enforce standards that relate to the project Understand the objectives Risk varies with application deployments Use flexible rule sets Compliance rules (e.g., PCI) Language and framework specific rules Custom rules for custom frameworks High/low security requirements
  • 16. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 16 Adaptive Best Practice 2. Compliance rule sets PCI-DSS v 3 The vulnerabilities listed at 6.5.1 through 6.5.10 were current with industry best practices when this version of PCI DSS was published. However, as industry best practices for vulnerability management are updated (for example, the OWASP Guide, SANS CWE Top 25, CERT Secure Coding, etc.), the current best practices must be used for these requirements. Specific rule sets SANS Top 25 Reporting for regulatory audits OWASP Top 10
  • 17. Best practices for Agile teams © 2015 Rogue Wave Software, Inc. All Rights Reserved. 17 Adaptive Context for remediation Integrate security and compliance testing1 Enforce standards that relate to the project2 Context for remediation3 Continuous improvement4 Reporting for all stakeholders5
  • 18. Provide information needed to act © 2015 Rogue Wave Software, Inc. All Rights Reserved. 18 Best Practice 3. Context for remediation What needs architectural review? Provide actionable results Prioritize results to accelerate triage Eliminate “noise” from reporting What can I fix quickly?
  • 19. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 19 Adaptive Best Practice 3. Minimize code changes after code check-in Trace errors to root causes Input validation Manifests itself when tainted data is used A single error can result in 10’s or 100’s of issues
  • 20. Best practices for Agile teams © 2015 Rogue Wave Software, Inc. All Rights Reserved. 20 Adaptive Context for remediation Integrate security and compliance testing1 Enforce standards that relate to the project2 Context for remediation3 Continuous improvement4 Reporting for all stakeholders5
  • 21. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 21 Adaptive Best Practice 4. Continuous improvement Help developers learn on the job Move from training “events” to a training “process” Source: https://uwaterloo.ca/counselling-services/curve-forgetting Push remediation advice to the IDE
  • 22. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 22 Adaptive Best Practice 4. Ongoing developer education Remediation advice in the IDE Specific to bug type Specific to language rule set
  • 23. Best practices for Agile teams © 2015 Rogue Wave Software, Inc. All Rights Reserved. 23 Adaptive Context for remediation Integrate security and compliance testing1 Enforce standards that relate to the project2 Context for remediation3 Continuous improvement4 Reporting for all stakeholders5
  • 24. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 24 Adaptive Best Practice 5. Enterprise reporting Development Security reporting Compliance reporting Legal reporting Identify security training needs Maintain independence of audits Testing for OWASP/SANS bugs Audits and reporting for OSS Traceability for security risks
  • 25. © 2015 Rogue Wave Software, Inc. All Rights Reserved. 25 Adaptive How to get started Empower development with training, processes, and technology to own security testing Build testing earlier into the development process Start with a pilot project Develop coding and remediation standards Close the loop 1 2 3 4 5 72% of developers think they are responsible for security
  • 26. See us in action: www.roguewave.com Klocwork OpenLogic

Notas do Editor

  1. Last time we talked about network intrusion, risks and vulnerabilities. As part 2 of 3 webinars, today we’ll discuss Agile development methodology, the goals of security testing, and best practices for integrating security and compliance testing in the Agile environment. And finally, we’ll leave you with an action plan.
  2. The primary principles of Agile development are adaptive methodologies and integrated development teams. In an Agile environment, developers work in short build cycles, or sprints, to focus on a few key features for each release. Feedback from customers (internal or external) and other stakeholders is constant and welcomed. This allows Agile teams to respond quickly to changing requirements, making sure that they deliver the right features and functionality, faster. Traditional development teams are separate groups made of exclusively of developers. Agile teams are more inclusive, and include all stakeholders. Product owners, architects, developers and QA work together to produce a series of deployable releases. Smaller functional releases makes testing quicker, allowing faster feedback and response. Working together ensures that all requirements are known to all parties, and negotiations over functionality and delivery dates can be negotiated quickly, resulting in faster time to market. We run Agile here at Rogue Wave, with our Scrum teams on two-week sprints for all our product development.
  3. Agile has become popular because it offers several advantages over the waterfall methodologies. Unlike waterfall development, with fixed requirements, longer development cycles, and 1-2 releases each year, Agile development is adaptive, with frequent, functional releases. In Agile, changing requirements are a feature, not a bug. Agile teams are integrated, with product owners, architects, developers and testing professionals working together. In traditional development shops, there is a separation of duties. Security and compliance testing are independent of development. They conduct their tests, analyze the results, and provide development with bug lists, typically late in the development process With shorter release cycles and integrated teams, Agile allows organizations to adapt to changing market needs quickly, and deliver usable software faster. While you may think Agile is best suited for smaller projects, such as websites and GUI, most companies are testing or applying Agile in their most critical – and complex - application development efforts. it is increasingly used in larger, more complicated projects. Surprisingly, we’ve also seen Agile in mixed hardware and software projects.
  4. So when we examine security as it often happens during development, the functions are separate. In a traditional development environment, security, compliance, and development are separate, autonomous groups. The argument for this is the principal of Separation of Duties – in this case making sure that independence exists between development and security. Development builds a release, tests it for functionality, then passes it to security for testing. Security tools have traditionally been used only by security personnel, typically later in the development lifecycle. Tools include static analysis of source code, dynamic analysis of running applications, and scanning for vulnerable open source components. At each phase of the Secure Development Lifecycle, there are a number of best practices. Security requirements, threat modeling, and several other activities help organizations avoid problems later in the secure software development lifecycle.
  5. The problem with this, in particular as it applies to an Agile environment, is that the testing happens late in the development process, independent of the development team. For example, Traditional static testing requires a compilable application, complete with all dependencies, usually only possible after significant development efforts.. Dynamic analysis, or pen testing, requires a finished application in a test environment, complete with data. By definition this will be very late in the development process. There have been many studies on the costs associated with delaying security testing, but the numbers remain fairly consistent. The later in the process a bug is identified, the more costly it is to remediate; up to 150X as much as fixing the bug during the requirements or design phase. It’s easy to understand why. Not only is it likely that more code refactoring will be required once an application is “fully baked”, but organizational costs come into play, including triage, prioritization, research, recoding, and retesting to ensure the fix didn’t introduce other problems. In short, costs are higher and releases are delayed. We recently had Jeffrey Hammond of Forrester present at an event, and he said “"It takes 18 months to deploy a new release of a project/product/app where a single line of code is changed.” Finally, we’ve seen this model result in conflicts between security and development teams. The development teams often feel that security has little involvement during the build process, to only parachute in late in the process, run code through their magic boxes, and produce a long list of bugs – with lots of false positives – just when the product is getting to its release date.
  6. In an Agile environment, release cycles may be measured in days rather than weeks, making testing for security and compliance more challenging. Agile requires frequent testing and rapid, continuous feedback. Shipping code to a separate group for testing, and receiving results days later, will break the Agile model. To be successful in an Agile environment, compliance and security testing and feedback must be integrated with the rest of the Agile team. Note, with Agile, “Release to Market” doesn’t always mean an external release, Potentially shippable increment, or PSI, and minimum viable product (MVP) are two terms used to describe what may or may not be released to customers. When we examine the process, testing is brought in throughout the development lifecycle, rather than waiting until the development is complete. For this reason, testers are typically part of the Agile teams, and testing user stories are built into the backlog from the outset of the sprint, or iteration.
  7. The first step to deploying an integrated security model is to identify the goals. In an Agile environment, the teams have responsibility for requirements, design, building, and testing applications. Security needs to be part of this, and participate at each phase of the SDL. There is not a single model that works for all Agile teams, so we need to understand the objectives, risk tolerance, and needs of each Agile team Integration with Agile requires receiving information in a timely manner, so teams can react, adjust, and respond while not breaking the schedule Continuous integration and Agile allow teams to improve over time – the same should be true for security practices in Agile Finally, we need to maintain the integrity of the separation of duties principle – an Agile environment does not have to mean no oversight
  8. Best practices for integrating security and compliance testing in the Agile environment are designed to meet the fundamental requirements of both the Agile methodology and the legitimate requirements of security and compliance groups. These make possible the advantages of Agile development, and state of the art testing tools and methodologies. They include: Integrate security and compliance testing Flexible deployments Context for remediation Continuous improvement Reporting for all stakeholders Let’s look at each of these in depth.
  9. Best practices for integrating security and compliance testing in the Agile environment are designed to meet the fundamental requirements of both the Agile methodology and the legitimate requirements of security and compliance groups. These make possible the advantages of Agile development, and state of the art testing tools and methodologies. They include: Integrate security and compliance testing Flexible deployments Context for remediation Continuous improvement Reporting for all stakeholders We will now address each practice separately.
  10. #1 – Integrate security and compliance testing In an Agile environment, the teams have responsibility for requirements, design, building and testing applications. The integrated teams have the authority to determine when all requirements are met. Security should be included in this as well. Rather than outsource security and compliance testing to an outside group, security and compliance need to adapt to the same rules as everyone else, and work within the Agile team. This provides the teams with the responsibility and the tools to deliver software quickly that meets the needs of all stakeholders., and to fix bugs during each sprint. With security personnel working as part of the team, they can test and verify code on a schedule that works best for the team. The relative risk associated with any bug can be discussed and prioritized, and compensating controls can be evaluated for effectiveness without delay. By integrating security testing into the Agile team, faster feedback is both possible and necessary. Identifying critical security bugs earlier allows faster, less costly remediation, and ultimately a better end result delivered in a timely manner.
  11. Different teams will choose to integrate security and compliance testing in different ways. In the words of the Agile Manifesto, this means “Individuals and interactions over processes and tools” Some will follow the more traditional model, and run tests separately at the end of each sprint. This is the way many groups start out, as it’s simpler to integrate security in this manner. Security personnel run the tests, but do so as part of the Agile team. For groups working towards continuous integration, integrating testing into the build server allows automation of testing for security and compliance. Results are consistent, and those that are considered non-critical can be suppressed in the results so that they need not be revisited with each build. The most cost-effective approach, and one that is getting increased attention from forward-looking teams, is moving testing to the desktop by integrating with the IDE. This provides developers with immediate feedback and the opportunity to self-correct.
  12. #2 – Enforce standards as they relate to each project To determine the appropriate level of security testing required, we first need to understand the criticality of the application. An application that manages credit cards or healthcare information, which is also web-facing, poses different potential risks to an organization, and therefore requires different scrutiny than an internal tool. Compliance requirements may also come into play. Understand that the level of testing you perform, and the rule sets you deploy, should match those requirements. Once we understand the nature and criticality of the application, we can choose which security and compliance rule sets we use in testing. For example, web applications still exhibit a lot of SQL injection and cross-site scripting errors. Developers also make use of increasing amounts of open source software, some of which (especially older versions) include known security vulnerabilities. OWASP ranks these as three of their top 10 web application vulnerabilities, and PCI Data Security Standards require that you prove that you have tested for the top 10 vulnerabilities at a minimum. The rules you deploy in testing will also vary with the programming language and frameworks you deploy. Buffer overflow rules are important in C and C++ applications, Spring and Struts can require discrete rules to ensure secure usage, and many large organizations use custom frameworks to consistency. Custom frameworks may require custom rules to ensure secure use. In short, make sure you are testing for the types of vulnerabilities that are important to each application.
  13. Compliance rule sets are increasingly important to many organizations. While some regulatory bodies provide high level requirements, others, such as PCI, are very specific. In most cases, testing for the issues in the OWASP Top 10 or SANS Top 25 will meet these requirements. Specific rule sets OWASP Top 10 SANS Top 25 It is also best to have auditable reports that document your efforts. A report that describes the rules tested and results obtained, over time, provides evidence that you are following the requirements and remediating security issues appropriately.
  14. #3 – Provide Agile teams with appropriate context for remediating bugs One of the biggest problems development teams have with security testing is the ambiguity of the results. Even putting aside false positives, which can be overwhelming with some testing tools, developers need information on the root cause of the identified vulnerabilities to make changes as efficiently as possible. In an Agile environment, with a focus on speed, this is even more important. Testing tools need to provide context about reported issues to allow faster triage and remediation. The obvious first step is to use tools that allow you to prioritize results based on the severity and type of error. Eliminating informational results and, depending on the environment, low severity results, allows Agile teams to quickly narrow in on bugs that can be fixed in minutes, versus those that require help from architects and security specialists. This context also makes a case for testing at the desktop, as at that point in time, the developer writing code has the most context for addressing bugs and security vulnerabilities. Like any backlog issue, these errors can be triaged and prioritized. For example, a simple SQL injection error might be solved in minutes by changing a concatenated string to a parameterized statement. In contrast, an architectural error, such as improper authentication, may require more planning for a fix. The developers need to know what they should work on first to have the greatest impact on security, and maintain sprint momentum.
  15. The ability to provide developers with a “root cause” for a reported issue can be invaluable in minimizing code changes, and accelerating remediation. Take the example of input validation errors. Most tools report these when the data is used (at “the sink”, v. “the source”). Since user input may be used in multiple ways, a single input may manifest itself in dozens of sinks, and therefore dozens of reported errors. Each of those “sink issues” can be remediated individually, but this is time consuming. The appropriate remediation for this is to validate the input at the source, as this will automatically correct all of the sink errors. In other words, if you fix the problem in one spot, it will resolve all of the uses of that data. Look for tools that can trace, or track data interprocedurally to identify the root cause, and remediation becomes much more effective.
  16. Best practices for integrating security and compliance testing in the Agile environment are designed to meet the fundamental requirements of both the Agile methodology and the legitimate requirements of security and compliance groups. These make possible the advantages of Agile development, and state of the art testing tools and methodologies. They include: Integrate security and compliance testing Flexible deployments Context for remediation Continuous improvement Reporting for all stakeholders We will now address each practice separately.
  17. Best Practice #4 – Continuous Improvement Continuous improvement fits well with the Agile methodology, which is built around brief, repeatable processes. Helping Agile teams avoid, rather than fix security issues should be a high priority. Rather than forcing developers to look up remediation advice on the web, or from internal coding standards, push that information directly to the IDE where it can be easily used. Studies show that people learn through repetition. The graph represents what is known as the “forgetting curve”. The black line in the graph shows memory retention from a single class. In terms of security training, this means that holding a secure coding training event can be helpful, but if the information is not reinforced quickly and consistently, over 90% of the knowledge from that class can vanish with the first week! If brief reminders are provided, as shown by the yellow line in the graph, knowledge retention improves dramatically, until it ultimately becomes part of a student’s long term memory. Pushing security testing and remediation guidance to the IDE also provides developers with near real-time feedback, improving their ability to recognize risky coding structures and self-correct.
  18. Forcing developers to rely of Google for guidance is not a good practice. Not only are we reliant on the information that is available, and what Google believes to be relevant, you’re at the mercy of how the searcher asked the question. Results and methods will vary, making code maintenance more difficult. Instead, try to standardize coding and remediation standards. Look for tools that provide “best practices” for detecting, avoiding and remediating common bugs for each language you use. Over time, many organizations will customize and augment these to deploy their own coding standards that are specific to the language and frameworks used by the development teams. By pushing this to the IDE, organizations can accelerate remediation and provide continuous developer education.
  19. Best practices for integrating security and compliance testing in the Agile environment are designed to meet the fundamental requirements of both the Agile methodology and the legitimate requirements of security and compliance groups. These make possible the advantages of Agile development, and state of the art testing tools and methodologies. They include: Integrate security and compliance testing Flexible deployments Context for remediation Continuous improvement Reporting for all stakeholders We will now address each practice separately.
  20. Best Practice #5 – Enterprise Reporting While we advocate that Agile teams “own” testing for security and compliance, the principle of separation of duties must be honored. Separation of Duties provides checks and balances required for audits and provides other stakeholders with the information they require to do their jobs. When moving to integrated testing, remember the different “views” of the data required by other functional areas. Development will require roll-up reports to identify trends by type of bug, team, and perhaps individual users. This helps track the effectiveness of the teams, and help to pinpoint ongoing training needs. Security will require reporting to understand and quantify the risks associated with each application, and determine when intervention is required. Compliance needs information to submit with regulatory audits, and provide evidence that appropriate testing has taken place, and… Legal/Governance must ensure compliance with various open source licensing models.
  21. Getting started with integrated testing isn’t hard, but also requires planning to ensure a smooth process Provide Agile teams with the tools and responsibility for security and compliance testing, and include members from these disciplines in the Agile team. This will allow you to align everyone’s priorities and needs before you begin implementation. Start small and think big. Select a project for your pilot and determine the security and compliance standards for it. Make sure your process is flexible enough to accommodate critical security projects as well as non-critical ones. Consider the best way to integrate the testing activities. As stated, many start with integration into the build server, but integrating at the desktop provides additional efficiency and contribute to continuous improvement Build or purchase coding and remediation standards, and put them in a location that is easily accessed by developers, ideally in the IDE so workflow is not interrupted. This accelerates bug fixes and minimizes the risk of “development via Google searches” Finally, Close the loop – make sure all stakeholders can access the information they require independently. This addresses the separation of duties principal and simplifies internal and external auditing.
  22. This concludes the presentation, and we hope you found it helpful. For more information on Rogue Wave Klocwork, and its IDE-based security testing and remediation technology, a free trial is available at klocwork.com/freetrial For more information on open source security and compliance testing, please visit openlogic.com Thank you